A sampling of information security products CIOs are using to monitor and filter enterprise content. While the market for security applications that monitor and filter enterprise content is relatively new and small—around $60 million in 2006—Gartner says it is growing. Here’s a sampling of some infosecurity products CIOs are using today. iPrism St. Bernard Software claims iPrism blocks IM and peer-to-peer traffic and blocks employees from visiting URLs that are phishing sites, contain threats to PCs or aren’t prohibited by enterprise usage policies. Metron eTelemetry says Metron tracks bandwidth usage, surfing and chatting. Its Locate product passively maps people to the IT infrastructure. Together, eTelemetry claims its “people-to-IP” matching technology provides visibility into how each employee is using the infrastructure. Securify Securify claims its appliance passively captures and analyzes traffic into and out of critical data centers and across corporate boundaries such as extranets. Securify says its “monitors” track all transactions to users to provide a view of “who” is accessing “what” applications and “where” in the network. 7 Vontu claims that 7 is the first integrated, enterprise-class data loss prevention product that identifies “data at rest, data in motion and data at the endpoint”—meaning on servers, databases and PCs; e-mail, IM and Web; and removable media such as USBs, CDs and iPods. Vericept Vericept says its Risk Management platform gives enterprises visibility into all insider risk whether inadvertent or malicious. These include unauthorized access of confidential customer information; document leaks; unencrypted transmission of cardholder information; the posting of financial reports and source code; damaging blogs by insiders; intellectual property theft; and network and e-mail control. Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe